Universal Access To All Knowledge
Home Donate | Store | Blog | FAQ | Jobs | Volunteer Positions | Contact | Bios | Forums | Projects | Terms, Privacy, & Copyright
Search: Advanced Search
Anonymous User (login or join us)
Search Results
Results: 1 through 50 of 354 (0.003 secs)
You searched for: (collection:hackercons OR mediatype:hackercons) AND -mediatype:collection
[1] 2 3 4 5 6 7 8     Next    Last
[movies]Derbycon 2012 Day 1
Derbycon 2012 Day 1
Keywords: derbycon; hacking; security; louisville
Downloads: 11,861
[movies]Dojocon Videos
dojocon, hacking, security http://Dojocon.org http://hackerspaces.org/wiki/Reverse_Space Tiffany Strauchs Rad, @tiffanyrad International Cyber Jurisdiction: âKill Switchingâ Cyberspace, Cyber Criminal Prosecution & Jurisdiction Hopping John Strauchs, @strauchs Security and IT Convergence Richard Goldberg, @GoldbergLawDC Rules of Engagment: Mitigating Risk in Information Security Work Jon McCoy Ninja Patching .NET Marco Figueroa, @marcofigueroa & Kevin Figueroa Detecting & Defending You Network...
Keywords: dojocon; hacking; security
Downloads: 9,618
[movies]Derbycon 2012 Day 3
Derbycon 2012 Day 3
Keywords: derbycon; hacking; security; louisville
Downloads: 3,719
[movies]Super Jason Scott Presentation 64 - Tedd St. Rain
Presented at Notacon 6 in Cleveland, OH on April 17, 2009. Jason Scott walks through the context and playing of Super Mario 64, the Mario Brothers launch title accompanying the Nintendo 64. Talks about the growing field of "Platform Studies", the lessons learned from the unique situation of Super Mario 64, and describes ways that modern programmers and coders can learn from the approach taken to the relatively new general experience of the 3D Platformer in 1996...
Keywords: nintendo; mario; jason scott; notacon; blockparty; cleveland
Downloads: 2,639 5.00 out of 5 stars5.00 out of 5 stars5.00 out of 5 stars5.00 out of 5 stars5.00 out of 5 stars(1 review)
[movies]Derbycon 2012 Day 3 A
Derbycon 2012 Day 3
Keywords: derbycon; hacking; security; louisville
Downloads: 2,361
[movies]BSides Las Vegas 2012
Videos from Bsides Las Vegas 2012. Index at: http://www.irongeek.com/i.php?page=videos/bsideslasvegas2012/mainlist
Keywords: hacking; security; bsides; las vegasf
Downloads: 2,326
[movies]Jason Scott's Presentation Presentation - Jason Scott
During the preview evening of Notacon 6 in Cleveland, Ohio, Jason Scott, a frequent presenter at Notacon and other events, offered to give a presentation on the art of presenting. Subjects covered include motivation, performance, content, common pitfalls, frequent harbingers of narrative/presentation doom, and memories of presentations gone right and wrong. The speech was recorded with a static hi-def recorder, so Jason does walk offscreen or get cut off at various junctions, but his voice remai...
Keywords: presentation; jason scott; notacon
Downloads: 1,941 5.00 out of 5 stars5.00 out of 5 stars5.00 out of 5 stars5.00 out of 5 stars5.00 out of 5 stars(1 review)
[movies]Intro to Scanning Nmap, Hping, Amap, TCPDump, Metasploit, etc. Jeremy Druin @webpwnized
Intro to Scanning Nmap, Hping, Amap, TCPDump, Metasploit, etc. Jeremy Druin @webpwnized http://www.irongeek.com/i.php?page=videos/intro-to-scanning-nmap-hping-amap-tcpdump-metasploit-jeremy-druin
Keywords: hacking; security
Downloads: 1,717
[movies]Host Vulnerability Assessment with Nessus, NeXpose and Metasploitable 2
Host Vulnerability Assessment with Nessus, NeXpose and Metasploitable 2 from Jeremy Druin
Keywords: hacking; security. owasp; pen-testing
Downloads: 1,550
[movies]ShmooCon 2012 Firetalks
ShmooCon 2012 Firetalks
Keywords: hacking; security; shmoocon
Downloads: 1,454
[movies]Pen-testing practice in a box :How to assemble a virtual network
http://www.irongeek.com/i.php?page=videos/pen-testing-practice-in-a-box-how-to-assemble-a-virtual-network This is a re-upload, the last one had audio issues Presenter: Jeremy Druin Topics Virtual Box Installation Installing virtual machines Configuring virtual networks - bridged, nat, hostonly USB devices in virtual machines Wireless networks in virtual machines Installing Guest Additions How to install Mutillidae in Windows on XAMPP How to install Mutillidae in Linux Samurai Video Tutorials: ww...
Keywords: hacking; mutillidae; owasp; security
Downloads: 1,415
[movies]AIDE 2012
Videos from AIDE 2012 Videos embedded at http://www.irongeek.com/i.php?page=videos/aid2012/mainlist
Keywords: hacking; security; forensics
Downloads: 1,184
[movies]SQL Server Hacking By Jeremy Druin
SQL Server Hacking By Jeremy Druin as recorded as the Kentuckiana ISSA/
Keywords: sql; hacking; louisville
Downloads: 1,094
[movies]Into to Metrasploit
Intro to Metasploit Jeremy Druin @webpwnized
Keywords: Metasploit; Jeremy Druin; @webpwnized
Downloads: 1,031
[movies]Bsides Cleveland 2012 BsidesCLE
Videos from Bsides Cleveland 2012 All videos and download links are at: http://www.irongeek.com/i.php?page=videos/bsidescleveland2012/mainlist
Keywords: security; hacking
Downloads: 1,020 5.00 out of 5 stars5.00 out of 5 stars5.00 out of 5 stars5.00 out of 5 stars5.00 out of 5 stars(1 review)
[movies]H2K4 - Building Hacker Spaces Excerpts - Jason Scott Sadofsky
Collection of footage shot during the "Building Hacker Spaces" presentation at the Hackers on Planet Earth (HOPE) Conference in New York City. Mostly focuses on the personalities present both in the audience and onstage than the content of the speech; meant to provide alternate angles from MP3s and video footage, although not ultimately used. Not used in the BBS Documentary, ultimately.
Keywords: Hope; hackers; h2k4; 2600; bbs; documentary
Downloads: 998
[movies]Shmoocon FireTalks 2013
Shmoocon FireTalks 2013
Keywords: hacking; security; shmoocon
Downloads: 991
[movies]One Last Time: The Hacking/Phreaking History Primer - Jason Scott Sadofsky
Presented at The Last Hope, Hotel Pennsylvania, New York City, NY. Historian Jason Scott covers a broad range of hacker history subjects, focusing on providing the tools for understanding the context of hacking and computer history. Subjects covered include 1800-era hacker cons, myths in the Hacker "story", names and events likely forgotten, and some of the touchstones of what hackers consider their lore.
Keywords: Hacking; phreaking; jason scott
Downloads: 958
[movies]Hack3rcon 3 (2012)
Videos of the talks from Hack3rcon 3 (2012)
Keywords: hacking; security; hack3rcon
Downloads: 779
[movies]Crypto & Block Cipher Modes (OpenSSL, AES 128, ECB, CBC) - Adrian Crenshaw
Demo video on Crypto & Block Cipher Modes (OpenSSL, AES 128, ECB, CBC)
Keywords: OpenSSL; AES 128; ECB; CBC
Downloads: 733
[movies]Random H2K4 Footage - Jason Scott Sadofsky
During shooting of the BBS Documentary, I took some exploratory footage of various events and places, seeing if they might be added as bonus footage. This is one of those explorations; about 6 minutes of footage shot of H2K4, the Hackers on Planet Earth conference in New York City in July of 2004. I decided against using the footage but am including it in the collection since it's a good range of footage of the general event...
Keywords: hope; hackers; h2k4; 2600; bbs; documentary
Downloads: 700
[movies]FireTalks at Shmoocon 2011
FireTalks at Shmoocon 2011. These are straight recordings of the two nights of FireTalks at Shmoocon, which were held in the evenings after the regular Shmoocon talks had completed. Recordings by Adrian "IronGeek" Crenshaw. Night 1: January 28, 2011 8:00 @Grecs - Welcome & Announcements 8:15 Ralph “@RalphBroom” Broom & Danny Gottovi - Protocol Security: You’re (Still) Doing It Wrong Despite the wide availability and known advantages of encrypted communications across the Internet, use of t...
Keywords: hacking; security; shmoocon; firetalks; 2011
Downloads: 691
[movies]ShmooCon Epilogue 2012
ShmooCon Epilogue 2012
Keywords: security; hacking; cyber
Downloads: 601
[audio]DeepSec 2007 Audio - DeepSec
RPC Auditing Tools and Techniques Aaron Portnoy, Cody Pierce, TippingPoint Security Research Team RPC auditing is currently a tedious and manual process. When complex embedded structures, arrays, and unions are present in an IDL, coding the client involves much debugging and time. The discussed tools are the culmination of a few weeks worth of research performed by Aaron Portnoy and Cody Pierce that allow a researcher to very quickly be able to communicate and audit an RPC server...
Keywords: deepsec; hacker; conference; anarchivism
Downloads: 592
[movies]Traceroute and Scapy Jeremy Druin webpwnized
Video tutorial from Jeremy Druin
Keywords: hacking; security; web
Downloads: 575
[movies]PhreakNIC 16 (2012)
PhreakNIC 16 (2012) Videos
Keywords: phreaknic; hacking; security
Downloads: 535
[movies]The Best of DEFCON 7 (HNC Network)
Immortality Video Presents: The Best of Defcon 7. A production by the HNC Network. Documentary released in 1999 of the DEFCON 7 Hacking Conference. Sequences include: Extended Interview with Jeff Moss (The Dark Tangent), Sumo Wrestling, Extended Interview with Noid, Hacker Jeopardy, Say Hello to HackCanada, Interview with Random Hackers, Extended Interview with the NightStalker, Say Hello to Space Rogue, Say Hello to Kevin Poulsen, Cult of the Dead Cow Release BO2K...
Downloads: 510
[movies]ShmooCon 2014 - Controlling USB Flash Drive Controllers: Expose of Hidden Features - Richard Harman
Controlling USB Flash Drive Controllers: Expose of Hidden Features Richard Harman With stories of "BadBIOS" infecting PCs simply by connecting a malicious USB flash drive to a PC, it's time we learned about flash drives and their controllers. Consumer USB flash drives are cheap, growing in capacity and shrinking in physical size. There are only around 15 prominent controller chip manufacturers whom you have never heard of, but OEM for all the popular and respected "name brands" on the market...
Downloads: 477
[movies]Deepsec 2009 Video - Deepsec
Videos from Deepsec 2009.
Keywords: deepsec; hacker; conference; hacking
Downloads: 463
[movies]Louisville Infosec 2012 Videos
Videos from the Louisville Infosec 2012.
Keywords: louisvile; infosec; security; hacking; lock picking
Downloads: 451
[movies]SkyDogCon 2011
SkyDogCon 2011
Keywords: hacking; security; skydogcon
Downloads: 447
[movies]SkyDogCon 2012
SkyDogCon 2012
Keywords: SkyDogCon; nashville; hacking; security
Downloads: 439
[movies]Notacon 9 Videos
Notacon 9 Videos
Keywords: hacker; maker; notacon
Downloads: 409
[audio]When the Party Van is at your doorstep - joepie91 (Sven Slootweg)
This is an audio recording of a talk or event held at OHM2013, in the NoisySquare area. More information about the event can be found at http://ohm2013.org/ and https://noisysquare.com/. This recording is licensed under a WTFPL or CC0 license, whichever you prefer.
Keywords: ohm2013; noisysquare; raid
Downloads: 356
[movies]Outerz0ne 2009
Outerz0ne 2009 hacker con Uploading it here after moving it from Blip. Just want it to be preserved.
Keywords: hacker; con; security
Downloads: 276
[movies]OHM2013: Ajin Abraham - Abusing Exploiting and Pwning with Firefox Add-ons
The talk is about abusing and exploiting Firefox add-on Security model and explains how JavaScript functions, XPCOM and XPConnect interfaces, technologies like CORS and WebSocket, Session storing and full privilege execution can be abused by a hacker for malicious purposes. The widely popular browser add-ons can be targeted by hackers to implement new malicious attack vectors resulting in confidential data theft and full system compromise...
Keywords: OHM2013; talk; Ajin Abraham; Firefox; Javascript; security; XPCOM; Mozilla Foundation; add-on; XPConnect; CORS; WebSocket; keylogger; DDoS
Downloads: 274
[movies]OHM2013: Jaya Baloo - Attitude And Action From KPN Security
A presentation of how KPN sees the infosec landscape of threats and risks and how we prepared a strategy to address it. We will present our approach to information security and ourselves. Our team will explain what we do every day to help make stuff more secure, and that its an ongoing activity.Event Schedule page: https://program.ohm2013.org/event/218.html
Keywords: OHM2013; Jaya Baloo; KPN; security
Downloads: 220
[movies]The potential impact of Software Defined Networking on security - Brent Salisbury
The potential impact of Software Defined Networking on security - Brent Salisbury
Keywords: Louisville; ISSA. security
Downloads: 215
[movies]Deepsec 2011 Video - Deepsec
Videos from Deepsec 2011.
Keywords: deepsec; hacker; conference; hacking
Downloads: 184
[movies]OHM2013: Breaking The Taboo (With QA) (film screening)
Screening of cult film "Breaking the Taboo" - a documentary uncovering the failure of the UN sanctioned war on drugs followed by Q&A with Countess Amanda Fielding of the Beckley Foundation, Annie Machon of Law Enforcement Against Prohibition (LEAP), and John Gilmore The War on Drugs has failed. After 50 years of prohibition, illicit drugs are now the third most valuable industry in the world after food and oil, all in the control of criminals...
Keywords: OHM2013; talk; Amanda Fielding; Annie Machon; John Gilmore; screening; beckley foundation; LEAP; Law Enforcement Against Prohibition; prohibition; drug; drugs; narcotics
Downloads: 179
[movies]Outerz0ne 8 (2012)
Videos from Outerz0ne 8 (2012).
Keywords: hacking; security; con; Outerz0ne
Downloads: 166
[movies]Lockpicking and Physical Security Fundamentals - Deviant Ollam
Physical security isn't just a concern of the IT world. Besides securing server rooms, locks of all sizes and styles are scattered throughout our lives. However, much of the general public is unaware of the insecurities present in many lock designs. Through discussion and direct example, Deviant Ollam will address the strengths and weaknesses of the locks we see everyday securing doors, bikes, guns, computers, and more...
Downloads: 143
[movies]The Church of Wi-Fi presents: An Evil Bastard, A Rainbow and a Great Dane! - Renderman, Thorn, Dutch, and Joshua Wright
The Church of Wifi has been hard at work in the last 6 months. At what, we aren't sure. When we woke up we found we had some projects lying around we thought we'd share. Breaking WPA-PSK is possible with coWPAtty, but trying to do so onsite can be time consuming and boring. All that waiting around for things to be computed each and every time we want to check for dumb and default passwords. Well, we're impatient and like to know the password NOW! So we came up with a 'jdumas' tool to do this for...
Downloads: 135
[movies]OHM2013: Karsten Nohl - Sim Card Exploitation Karsten Nohl
SIM cards are among the most widely-deployed computing platforms with over 7 billion cards in active use, but little is known about their security beyond manufacturer claims. Besides SIM cards main purpose of identifying subscribers, most of them provide programmable Java runtimes. Based on this flexibility, SIM cards are poised to become an easily extensible trust anchor for otherwise untrusted smartphones, embedded devices, and cars...
Keywords: OHM2013; Karsten Nohl; SIM card; exploitation; security
Downloads: 134
[movies]Pen-testing practice in a box: How to assemble a virtual network
Pen-testing practice in a box How to assemble a virtual network Presenter: Jeremy Druin
Keywords: hacking; security
Downloads: 119
[movies]Network Security Monitoring with Sguil - Richard Bejtlich
This talk will introduce the open source network security monitoring suite called Sguil (www.sguil.net). Sguil is a Tcl/Tk interface to alert data from Snort, session data from the Security Analyst Network Connection Profiler (SANCP), and full content data from Tcpdump or a second instance of Snort. Sguil is unlike any Web-based alert GUI used to perform so-called "analysis" of Snort alerts, like ACID or BASE...
Keywords: Shmoocon; 2006; Richard Bejtlich; Network Security Monitoring
Downloads: 110
[movies]ConCon: A History of Hacker Conferences - Jason Scott
"This con sucks. In fact, every con sucks. Every con was better last year, and that con sucked too." While this sort of discussion takes place at hundreds of bars, hotel rooms and meeting spaces every year, it would be a good thing to have a solid body of knowledge about the history of hacker conferences, their roots and pre-roots, and trends they show as both a cultural event and context in the world...
Keywords: Shmoocon; 2006; Jason Scott; History; ConCon
Downloads: 101
[movies]Reverse Engineering for Fun and BoF It! - Pedram Amini and Chris Eagle
Reverse engineering (RE) skills are handy in a number of situations. Determining the behavior of malware, discovery of software vulnerabilities and showing off to your friends are just a few of the benefits that immediately come to mind. Unfortunately reverse engineers are mostly self trained, work in solitude and do not openly work together when developing tools and techniques. This goal of this session is to present some of our ideas and tools (past, present and future) to foster an open discu...
Keywords: Shmoocon; 2006; Chris Eagle; Pedram Amini; Reverse Engineering
Downloads: 101
[movies]OHM2013: Sprite_tm - Hard Disks More Than Just Block Devices
In this talk, we take a look at one of the more obscure parts of an hard disk: the HD controller. In any cheapo disk, it should do nothing more than channel bits between the SATA-port and the heads on the platter, but what does it actually consist of? And can we make it do some more interesting things? From an OS view, a hard disk is a very simplistic device: any block you write to it, you can read back later in it's exact same form...
Keywords: OHM2013; Sprite_tm; Jeroen; hard disk; controllers; hack; porting; linux
Downloads: 91
[movies]OHM2013: Kimiko Ishizaka Plays Bach And Chopin
Kimiko Ishizaka plays Bach and Chopin: A celebration of makers, and free culture. Join Kimiko Ishizaka, the pianist who recorded the Open Goldberg Variations, for a journey into the musical worlds of two of the greatest musical geniuses. J.S. Bach and Frederic Chopin were two of the greatest music hackers and makers of all time. Their works are timeless and continue to thrill audiences and performers centuries after their work was finished...
Keywords: OHM2013; Bach; Chopin; Kimiko Ishizaka; Piano
Downloads: 84
[1] 2 3 4 5 6 7 8     Next    Last
Advanced search

Sort results by:

Average rating
> Download count
Date added

Group results by:

> Relevance

Related mediatypes